Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/01/2023, 15:26

230111-st6fyahc2v 1

11/01/2023, 15:20

230111-sq37eadd28 1

11/01/2023, 15:14

230111-smrn7sdc95 3

11/01/2023, 15:12

230111-sk7yeadc88 1

11/01/2023, 15:03

230111-sfc78shb61 1

Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2023, 15:20

General

  • Target

    https://github.com/LeandroCostaAnalistaTI/Ferramentas/blob/master/Planos/Ferramentas_UsandoRoot.sh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/LeandroCostaAnalistaTI/Ferramentas/blob/master/Planos/Ferramentas_UsandoRoot.sh
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4500 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1136

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    779B

    MD5

    1c594fd1768bd90b1c27ef3f0dd83f3c

    SHA1

    827faa61ac0090ac7e11d0e50f52d3ea51706da4

    SHA256

    ce029815cf58d4bb17ac36774cca2067d355c4b45e03d2c1287bcfbb5ad31569

    SHA512

    e156ad98844314316d7415a57dd77ad65c996021c70e97457188dbe9ac12e230fc11f957fa74fdf5ce7fc2e4c17961c0ca95ad5d9369f44e25456fe8c4d65c97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    246B

    MD5

    798ea9f45a3d11ac567cc5e2dd9b9f22

    SHA1

    bc0ea1f8aff6ed18a974f568967604aaf89811c8

    SHA256

    a7a970eae2d9827398f83fa672546bb6864b702a6637c5d7b6d7be729cb5c596

    SHA512

    31b453f589a01b43b812996b8d029d4019a8dd4113fb9ee30ba82df97680b951821d61c4727cba2265e3b7b69b81032d8341ceb90768444ee3f748033f6b5887

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\zpu22o1\imagestore.dat

    Filesize

    1KB

    MD5

    24e6f786418abe0c57b26abc0665a3a3

    SHA1

    b35bd8ea9736a5ccbc9dc64581767fdc450427aa

    SHA256

    838df81c5e97371b2e9b2bc5e9ee36828c773b72db7319205fb9f5d91afad1b6

    SHA512

    48dccf8551b36bd7247382a43e2693f43bcb1d1f26e71d86f0352889521425a6f16e08c04f5d31faa8e7cfd49d0848cb7d2f0cff770eeb70f68e884ead0b2ffb